Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 21:33
Behavioral task
behavioral1
Sample
lfcdgbuksf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lfcdgbuksf.exe
Resource
win10v2004-20241007-en
General
-
Target
lfcdgbuksf.exe
-
Size
1.6MB
-
MD5
8c6e4c86c216b898f24ff14b417c4369
-
SHA1
266e7d01ba11cd7914451c798199596f4d2f7b53
-
SHA256
858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f
-
SHA512
3f6416bf0b7989b522d399e151cc755783b9b7afe9cde559f8207fad6c043e24f85b22c3a583329e1620e862c7824249c536209b6be5e093a2b580c2fc52f660
-
SSDEEP
24576:o2a0H/WPj+rsO6AOhaDxL/aySUYj79FcPX6t1:va0SKsOP1L/KzEP
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 3 IoCs
resource yara_rule behavioral1/memory/2684-1-0x0000000000820000-0x00000000009BC000-memory.dmp family_dcrat_v2 behavioral1/files/0x000e000000012117-32.dat family_dcrat_v2 behavioral1/memory/2476-34-0x0000000000280000-0x000000000041C000-memory.dmp family_dcrat_v2 -
Executes dropped EXE 1 IoCs
pid Process 2476 staticfile.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe 2684 lfcdgbuksf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2684 lfcdgbuksf.exe Token: SeDebugPrivilege 2476 staticfile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2476 staticfile.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2208 2684 lfcdgbuksf.exe 30 PID 2684 wrote to memory of 2208 2684 lfcdgbuksf.exe 30 PID 2684 wrote to memory of 2208 2684 lfcdgbuksf.exe 30 PID 2208 wrote to memory of 2492 2208 cmd.exe 32 PID 2208 wrote to memory of 2492 2208 cmd.exe 32 PID 2208 wrote to memory of 2492 2208 cmd.exe 32 PID 2208 wrote to memory of 2980 2208 cmd.exe 33 PID 2208 wrote to memory of 2980 2208 cmd.exe 33 PID 2208 wrote to memory of 2980 2208 cmd.exe 33 PID 2208 wrote to memory of 2476 2208 cmd.exe 35 PID 2208 wrote to memory of 2476 2208 cmd.exe 35 PID 2208 wrote to memory of 2476 2208 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\lfcdgbuksf.exe"C:\Users\Admin\AppData\Local\Temp\lfcdgbuksf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\17KUxeyvo4.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2492
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2980
-
-
C:\Users\Admin\AppData\Local\staticfile.exe"C:\Users\Admin\AppData\Local\staticfile.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD5597adc9bf942ba54f16e777c0e3f5a93
SHA17ca071798980b49fbb1930594346941574d37db1
SHA2562297396cf6b0f7b742772c46bdd074f6bf4abdef593ab815afe800c6a2a46ddc
SHA512ba49bd3cbb1991152b4a400516e8ff71a1919eb32dc04dc71df936d45fdb7143b530584a8ab2adf79b74f8553915e6245692de0bfa88fcd7eb4799dfc7939375
-
Filesize
1.6MB
MD58c6e4c86c216b898f24ff14b417c4369
SHA1266e7d01ba11cd7914451c798199596f4d2f7b53
SHA256858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f
SHA5123f6416bf0b7989b522d399e151cc755783b9b7afe9cde559f8207fad6c043e24f85b22c3a583329e1620e862c7824249c536209b6be5e093a2b580c2fc52f660